Glossary
Term Description
Database
An electronic filing system for organizing collections of information. Most databases are organized by files, records, and fields. An integrated aggregation of data usually organized to reflect logical or functional relationships among data elements.
Database management system (DBMS)
An application that enables the storage, modification, and extraction of information from a database. The software that directs and controls data resources.
Datagram
Logical grouping of information sent as a network layer unit over a transmission medium without prior establishment of a virtual circuit. IP datagrams are the primary information units in the Internet. The terms “cell,” “frame,” “message,” “packet,” and “segment” are also used to describe logical information groupings at various layers of the OSI Reference Model and in various technology circles. The combination of Transport layer UDP header and payload.
Deadlock
A condition that occurs when two users invoke conflicting locks in trying to gain access to a specific record or records. A situation in which computer processing is suspended because two or more devices or processes are each awaiting resources assigned to the other.
Decipher
Convert enciphered text to plain text by means of a cryptographic system. The ability to convert, by use of the appropriate key, enciphered text into its equivalent plaintext.
Decision support system (DSS)
A computer information system that helps executives and managers formulate policies and plans. This support system enables the users to access information and assess the likely consequences of their decisions through scenario projections. An application that analyzes business data and presents it so as to make business decisions easier for users. DSS is considered an informational application more so than an operational application. Often a DSS is employed by knowledge workers (such as help desk or customer support) and by sales services (such as phone operators).
Declassification
The determination that particular classified information no longer requires protection against unauthorized disclosure in the interest of national security. Such determination shall be by specific action or automatically after the lapse of a requisite period of time or the occurrence of a specified event. If such determination is by specific action, the material shall be so marked with the new designation. The process of moving a resource into a lower classification level once its value no longer justifies the security protections provided by a higher level of classification.
Dedicated Mode
information system security mode of operation wherein each user, with direct or indirect access to the system, its peripherals, remote terminals, or remote hosts, has all of the following: a. valid security clearance for all information within the system; b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments, and/or special access programs); and c. valid needtoknow for all information contained within the information system. When in the dedicated security mode, a system is specifically and exclusively dedicated to and controlled for the processing of one particular type or classification of information, either for fulltime operation or for a specified period of time. See dedicated security mode. The operation of a computer system such that the central computer facility, connected peripheral devices, communications facilities, and all remote terminals are used and controlled exclusively by the users or groups of users for the processing of particular types and categories of information.
Dedicated Security Mode
A system is operating in the dedicated security mode when the system and all of its local and remote peripherals are exclusively used and controlled by specific users or groups of users who have a security clearance and needtoknow for the processing of a particular category and type of classified material. . Mode in which the system is authorized to process only a specific classification level at a time. All system users must have clearance and a need to know that information.
Defense-in-depth
IA strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and dimensions of networks. Synonymous with securityindepth. Provision of several overlapping subsequent limiting barriers with respect to one safety or security threshold, so that the threshold can only be surpassed if all barriers have failed. The practice of layering defenses to provide added protection. Security is increased by raising the cost to mount the attack. This system places multiple barriers between an attacker and an organization’s business critical information resources. This strategy also provides natural areas for the implementation of intrusiondetection technologies.